Showing 13,561 - 13,580 results of 16,001 for search '"bit"', query time: 0.13s Refine Results
  1. 13561

    Rateless spinal codes by Perry, Jonathan, Balakrishnan, Hari, Shah, Devavrat

    Published 2013
    “…In this paper, we present a novel rateless code, the spinal code, which uses a hash function over the message bits to produce pseudo-random bits that in turn can be mapped directly to a dense constellation for transmission. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 13562

    Animate some novel erasure codes from a web demo by Le, Quang Hoa

    Published 2014
    “…My program allows user to input data in type of bits and demo how data is encoded and decoded by LRC. …”
    Get full text
    Final Year Project (FYP)
  3. 13563

    AAβ public-key cryptosystem - a practical implementation of the new asymmetric by Mahad, Zahari, Kamel Ariffin, Muhammad Rezal

    Published 2013
    “…Furthermore, to support our understanding by providing a statistical analysis of times taken to implement the key generation, encryption and decryption algorithm for the key sizes 3072, 6144, 9216 and 12288 bits for message spaces of 4n where n = 512, 1024, 1536 and 2048 bits. …”
    Get full text
    Article
  4. 13564

    AAβ public key cryptosystem - a new practical asymmetric implementation based on the square root problem by Mahad, Zahari, Kamel Ariffin, Muhammad Rezal

    Published 2012
    “…Furthermore, to support our understanding by providing a statistical analysis of times taken to implement the key generation, encryption and decryption algorithm for the key sizes 3072, 6144, 9216 and 12288 bits for message spaces of 4n where n = 512, 1024, 1536 and 2048 bits. …”
    Get full text
    Conference or Workshop Item
  5. 13565

    Enhanced AES-CCMP key structure in IEEE 802.11I by Saberi, Iman, Shojaie, Bahareh, Salleh, Mazleena, Niknafskermani, Mahan

    Published 2012
    “…The proposed method modifies AES-CCMP key length from 128 bits to 256 bits through recommending three distinctive solutions including Random Nonce Key, Four Way Handshake alteration and Pseudo Random Function (PRF). …”
    Book Section
  6. 13566
  7. 13567
  8. 13568
  9. 13569
  10. 13570
  11. 13571
  12. 13572

    Hardware Implementation Of Rc4a Stream Cipher Algorithm by Al Noman, Abdullah

    Published 2007
    “…The implementation is able to support variable key lengths from 8 bits up to 512 bits. Unlike other stream ciphers, the proposed implementation generates two output streams at a time, whereas others generate only one output stream. …”
    Get full text
    Thesis
  13. 13573

    Fish community of a fringing reef at Mochima National Park, Venezuela by E Méndez de E, LJ Ruiz, A Prieto, A Torres de J, A Fariña, S Sant, J Barrio, B Marin

    Published 2006-11-01
    “…La diversidad total fue de 4.54 bits ind–1 y osciló entre 3.33 y 4.25 bits ind–1 con un promedio de 3.86 bits ind–1. …”
    Get full text
    Article
  14. 13574
  15. 13575
  16. 13576
  17. 13577
  18. 13578

    Cybersecurity - An Agents based Approach? by Datta, Shoumen

    Published 2017
    “…In this article the potential of personal security agents (PSA) is suggested as a modular tool to model people, process, bits and atoms (objects) with layers to address trust, privacy and security. …”
    Get full text
    Article
  19. 13579

    A P300-Based Speller Design Using a MINMAX Riemannian Geometry Scheme and Convolutional Neural Network by Seyedeh Nadia Aghili, Abbas Erfanian

    Published 2023-01-01
    “…The results demonstrated that the accuracy (ITR) of the proposed method was 100% (8.9 bits/min) and 97% (8.5 bits/min) on dataset II from BCI-competition II and dataset II from BCI-competition III, respectively.…”
    Get full text
    Article
  20. 13580